{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T05:24:27Z","timestamp":1743571467657,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11042-021-11368-z","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T10:04:21Z","timestamp":1631181861000},"page":"36567-36584","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hiding data in dual images based on turtle shell matrix with high embedding capacity and reversibility"],"prefix":"10.1007","volume":"80","author":[{"given":"Xiao-Zhu","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"issue":"8","key":"11368_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"A Alattar","year":"2004","unstructured":"Alattar A (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"key":"11368_CR2","doi-asserted-by":"crossref","unstructured":"Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using Sudoku. In: Proceedings of third international conference on innovative computing, information and control, Dalian, China, pp 17\u201322","DOI":"10.1109\/ICICIC.2008.149"},{"key":"11368_CR3","doi-asserted-by":"crossref","unstructured":"Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the third international conference on multimedia and ubiquitous engineering, Qingdao, China, pp 145\u2013152","DOI":"10.1109\/MUE.2009.35"},{"key":"11368_CR4","doi-asserted-by":"crossref","unstructured":"Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. TENCON 2007\u20132007 IEEE Region 10 Conference, IEEE, pp1\u20134, 2007","DOI":"10.1109\/TENCON.2007.4483783"},{"key":"11368_CR5","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.3934\/mbe.2019168","volume":"16","author":"CC Chang","year":"2019","unstructured":"Chang CC, Li CT (2019) Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Math Biosci Eng 16:3367\u20133381","journal-title":"Math Biosci Eng"},{"key":"11368_CR6","doi-asserted-by":"publisher","first-page":"70720","DOI":"10.1109\/ACCESS.2018.2880904","volume":"6","author":"CC Chang","year":"2018","unstructured":"Chang CC, Li CT, Shi YQ (2018) Privacy-aware reversible watermarking in cloud computing environments. IEEE Access 6:70720\u201370733","journal-title":"IEEE Access"},{"key":"11368_CR7","doi-asserted-by":"publisher","first-page":"54117","DOI":"10.1109\/ACCESS.2019.2908924","volume":"7","author":"CC Chang","year":"2019","unstructured":"Chang CC, Li CT, Chen K (2019) Privacy-preserving reversible information hiding based on arithmetic of quadratic residues. IEEE Access 7:54117\u201354132","journal-title":"IEEE Access"},{"key":"11368_CR8","doi-asserted-by":"crossref","unstructured":"Chang CC, Liu YJ, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: Proceedings of tenth international conference on intelligent information hiding and multimedia signal processing, Kitakyushu, Japan, pp 89\u201393","DOI":"10.1109\/IIH-MSP.2014.29"},{"key":"11368_CR9","doi-asserted-by":"publisher","first-page":"7125","DOI":"10.1007\/s11042-018-6469-4","volume":"78","author":"F Di","year":"2019","unstructured":"Di F, Zhang M, Liao X, Liu J (2019) High-fidelity reversible data hiding by Quadtree-based pixel value ordering. Multimed Tools Appl 78:7125\u20137141","journal-title":"Multimed Tools Appl"},{"key":"11368_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings ACM, special session on multimedia security and watermarking, Ottawa, Canada, October 5, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"key":"11368_CR11","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jvcir.2015.01.011","volume":"28","author":"NT Huynh","year":"2015","unstructured":"Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105\u2013112","journal-title":"J Vis Commun Image Represent"},{"key":"11368_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","volume":"163","author":"Y Jia","year":"2019","unstructured":"Jia Y, Yin Z, Zhang X (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process 163:238\u2013246","journal-title":"Signal Process"},{"key":"11368_CR13","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"CF Lee","year":"2013","unstructured":"Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52:2237\u20132247","journal-title":"Telecommun Syst"},{"issue":"6","key":"11368_CR14","first-page":"2181","volume":"22","author":"X Li","year":"2013","unstructured":"Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Signal Process Lett 22(6):2181\u20132191","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"11368_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"XL Li","year":"2013","unstructured":"Li XL, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93(1):198\u2013205","journal-title":"Signal Process"},{"issue":"3","key":"11368_CR16","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s11554-019-00863-0","volume":"16","author":"JY Lin","year":"2019","unstructured":"Lin JY, Liu YJ, Chang CC (2019) A real-time dual-image-based reversible data hiding scheme using turtle shells. J Real-Time Image Proc 16(3):673\u2013684","journal-title":"J Real-Time Image Proc"},{"issue":"19","key":"11368_CR17","doi-asserted-by":"publisher","first-page":"25295","DOI":"10.1007\/s11042-018-5785-z","volume":"77","author":"YJ Liu","year":"2018","unstructured":"Liu YJ, Chang CC (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295\u201325310","journal-title":"Multimed Tools Appl"},{"key":"11368_CR18","doi-asserted-by":"publisher","first-page":"90824","DOI":"10.1109\/ACCESS.2020.2994244","volume":"8","author":"TC Lu","year":"2020","unstructured":"Lu TC, Chang TC, Shen JJ (2020) An effective maximum distortion controlling technology in the dual-image-based reversible data hiding scheme. IEEE Access 8:90824\u201390837","journal-title":"IEEE Access"},{"issue":"3","key":"11368_CR19","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"11368_CR20","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","volume":"25","author":"F Peng","year":"2014","unstructured":"Peng F, Li XL, Yang B (2014) Improved pvo-based reversible data hiding. Digital Signal Process 25:255\u2013265","journal-title":"Digital Signal Process"},{"key":"11368_CR21","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2015.01.002","volume":"111","author":"XC Qu","year":"2015","unstructured":"Qu XC, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249\u2013260","journal-title":"Signal Process"},{"issue":"8","key":"11368_CR22","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"11368_CR23","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"PY Tsai","year":"2009","unstructured":"Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129\u20131143","journal-title":"Signal Process"},{"key":"11368_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2015.03.022","volume":"310","author":"X Wang","year":"2016","unstructured":"Wang X, Ding J, Pei Q (2016) A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci 310:16\u201335","journal-title":"Inf Sci"},{"issue":"14","key":"11368_CR25","doi-asserted-by":"publisher","first-page":"19413","DOI":"10.1007\/s11042-018-7098-7","volume":"78","author":"XZ Xie","year":"2019","unstructured":"Xie XZ, Chang CC et al (2019) A turtle shell based RDH scheme with two-dimensional histogram shifting. Multimed Tools Appl 78(14):19413\u201319436","journal-title":"Multimed Tools Appl"},{"key":"11368_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/ACCESS.2019.2961764","volume":"8","author":"XZ Xie","year":"2019","unstructured":"Xie XZ, Chang CC, Lin CC (2019) A hybrid reversible data hiding for multiple images with high embedding capacity. IEEE Access 8:37\u201352","journal-title":"IEEE Access"},{"key":"11368_CR27","doi-asserted-by":"publisher","first-page":"107447","DOI":"10.1016\/j.sigpro.2019.107447","volume":"170","author":"H Yao","year":"2020","unstructured":"Yao H, Mao F, Tang Z (2020) High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process 170:107447","journal-title":"Signal Process"},{"issue":"11","key":"11368_CR28","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"XP Zhang","year":"2006","unstructured":"Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11368-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11368-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11368-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T21:05:03Z","timestamp":1638565503000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11368-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":28,"journal-issue":{"issue":"30","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["11368"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11368-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"9 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}